Refer to the exhibit.

You have been tasked with replacing the managed switch Forti Switch 2 shown in the topology.
Which two actions are correct regarding the replacement process? (Choose two.)
c) The antivirus database queries FortiGuard with the hash of a scanned file. This is how the FortiGuard VOS service works. The FortiGate queries FortiGuard with the hash of a scanned file, and FortiGuard returns a list of known malware signatures that match the hash.
e) The hash signatures are obtained from the FortiGuard Global Threat Intelligence database. This is where the FortiGuard VOS service gets its hash signatures from. The FortiGuard Global Threat Intelligence database is updated regularly with new malware signatures.
Kattie
4 months agoGregg
5 months agoRashida
5 months agoKarl
5 months agoEffie
5 months agoSharee
6 months agoChauncey
6 months agoWeldon
6 months agoKaitlyn
6 months agoNatalie
6 months agoTijuana
6 months agoTemeka
6 months agoSharen
6 months agoJennifer
6 months agoMakeda
6 months agoFatima
11 months agoJeffrey
11 months agoAnnelle
9 months agoTennie
9 months agoArlean
9 months agoAzzie
10 months agoDylan
11 months agoAnglea
10 months agoKristel
10 months agoBeatriz
10 months agoGail
12 months agoKeva
11 months agoJanine
11 months agoGalen
11 months agoTerrilyn
11 months agoBrent
1 year agoWilliam
1 year agoBrent
1 year ago